The holiday has been started, you love to check your e-mail, Facebook or WhatsApp at your holiday location but can you trust the provided Wi-Fi-connection? The answer is: NO. Never trust these kind of Wi-Fi-networks. Maybe somebody has set up a wireless access point (AP)/WLAN-hotspot with the same name as the access point of your… Continue reading Public WiFi-hotspots and sensitive information, a good combination?
Add your picture to Google search results – Rich snippets
Maybe you noticed the fancy Google search results containing profile pictures already. When you don’t have a clue what I mean, you can find an example of a Google Search rich snippet at the top of this article. Pretty neat don’t you think? What are you thinking.. you do want to have the same fancy… Continue reading Add your picture to Google search results – Rich snippets
Cisco type 8 and 9 password hashes calculated using Java
In this article I will discuss three types of algorithms used by Cisco to calculate hashes from plain-text passwords, namely: Type 4, Type 5, Type 8 and Type 9. Back in the year 2013, the Type 4 algorithm was proven insecure because of an implementation error. The algorithm does not use PBKDF2 and does not… Continue reading Cisco type 8 and 9 password hashes calculated using Java
Dynamic public IP-address / Call – Home
Assume you do have a computer connected to the Internet which obtains it’s public IP-address dynamicly. Some providers like 1und1 in Germany require that the xDSL line is reset every day at least one time. At that moment you obtain a new IP-address from a pool of addresses. Privacy This dynamic IP-address is great if… Continue reading Dynamic public IP-address / Call – Home